Category: Cybersecurity

Cybersecurity

How to Manage Insider Risk

One of the most common questions we get from our clients is how much they should worry about the cybersecurity risks posed by their organization’s own employees. They often want to know whether their biggest risks are internal or external. Quite often, they’re surprised by the answer. According to the Verizon

Read More »
Cybersecurity

Top 4 Work-from-Anywhere Cybersecurity Tips

By now, we’re all familiar with the fact that the world of work has undergone dramatic change over the past two years. The abrupt office closures and large-scale shift to remote work that took place in 2020 were followed by a period of re-evaluation and self-scrutiny. According to the Microsoft 2022

Read More »
Technology Product Security: Maturing Your Program
Cybersecurity

Technology Product Security: Maturing Your Program

Once upon a time, in what’s now a bygone era, computers were computers, cars were cars and toasters were toasters. In today’s increasingly connected and sensor-enabled world, however, a new car can contain over 3,000 silicon semiconductor chips — since computing power is essential to controlling everything from in-car navigation systems to

Read More »
Cybersecurity

Ransomware Readiness: Practice Makes Progress

Already at record high levels, ransomware attack volumes are continuing to rise. According to the latest Verizon Data Breach Investigations Report, 2021 saw a year-over-year increase in the total number of ransomware attacks that was greater than all the growth that took place over the last five years combined. And the number

Read More »
How Can SASE Help Your Organization?
Cybersecurity

How Can SASE Help Your Organization?

FIRST, WHAT IS SASE (SECURE ACCESS SERVICE EDGE)? SASE (pronounced “sassy”) simplifies wide-area networking (WAN) and security by delivering both as a cloud service directly to the source of connection rather than the enterprise data center. Digital transformation, remote work from anywhere and cloud-based computing have accelerated cloud-delivered SASE offerings to

Read More »
Ransomware Readiness Guide
Cybersecurity

Ransomware Readiness Guide

Today’s ransomware operators are always coming up with new schemes. They’re constantly on the lookout for new vulnerabilities to weaponize, new operating models to take advantage of, and new alliances with other cybercriminal groups to exploit. Their goal is to come up with strategies that enable them to encrypt (and

Read More »